• Title/Summary/Keyword: Infrastructure Vulnerability

Search Result 138, Processing Time 0.026 seconds

Analysis of Reservoir Vulnerability Based on Geological Structure Around Pohang Earthquake (포항지진 발생 주변지역 지질특성에 따른 저수지 취약성 해석)

  • Lim, Sung Keun;Song, Sung-Ho;Yu, Jaehyung
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.22 no.3
    • /
    • pp.169-174
    • /
    • 2018
  • A total of 594 reservoirs (17%), which are managed by KRC, equipped with earthquake-resistant facilities whereas remaining ones did not. In addition, reservoirs were placed without the effect of geological structures (i.e., fault and lineament). Therefore, development on technique for alleviating the potential hazards by natural disasters along faults and lineaments has required. In addition, an effective reinforcement guideline related to the geological vulnerabilities around reservoirs has required. The final goal of this study is to suggest the effective maintenance for the safety of earth fill dams. A radius 2 km, based on the center of the reservoir in the study area was set as the range of vulnerability impacts of each reservoir. Seismic design, precise safety diagnosis, seismic influence and geological structure were analyzed for the influence range of each reservoir. To classify the vulnerability of geological disasters according to the fault distribution around the reservoir, evaluation index of seismic performance, precise safety diagnosis, seismic influence and geological structure were also developed for each reservoir, which were a component of the vulnerability assessment of geological disasters. As a result, the reservoir with the highest vulnerability to geological disasters in the pilot district was analyzed as Kidong reservoir with an evaluation index of 0.364. Within the radius of 100km from the epicenter of the Pohang earthquake, the number of agricultural infrastructure facilities subject to urgent inspections were 1,180 including reservoirs, pumping stations and intakes. Four reservoirs were directly damaged by earthquake among 724 agricultural reservoirs. As a result of the precise inspection and electrical resistivity survey of the reservoir after the earthquake, it was reported that cracks on the crest of reservoirs were not a cause of concern. However, we are constantly monitoring the safety of agricultural facilities by Pohang aftershocks.

Guidelines for the Construction of Vulnerability Map of Fire in Seoul (서울시 화재위험지도 구축방안에 관한 연구)

  • Kang, Young-Ok;Park, Mi-Ra
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.5 no.1 s.16
    • /
    • pp.1-12
    • /
    • 2005
  • In the area of disaster management, we have more focused on the rapid response and recovery, but preventive approach for disaster is becoming more and more important. For mitigation of disasters, we need to analyze the vulnerable area according to each disaster, and need to manage those area systematically. In this research, we selected the fire as a type of disaster, developed guideline of construction of vulnerability map of fire, and built the vulnerability map of fire in Changshin-Dong, Jongro-Gu, Seoul as a case study area. The vulnerability map of fire can be applied to grasp the vulnerable area in advance and manage it systematically. In addition, it can also be applied in the landuse planning and the rearrangement of infrastructure for the mitigation of disaster when we build detail city planning.

Research on Education and Training of the Analyzer for Security Enhancement of SW Vulnerability (SW 취약점의 보안성 강화를 위한 진단원의 교육 양성 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.945-950
    • /
    • 2017
  • Due to the vulnerability of the software, there is a hacking attack on the country's cyber infrastructure and real financial assets. Software is an integral part of the operating system and execution system that controls and operates Internet information provision, cyber financial settlement and cyber infrastructures. Analyzing these software vulnerabilities and enhancing security will enhance the security of cyber infrastructures and enhance the security of actual life in the actual country and people. Software development security system analysis and software development Security diagnosis analysis and research for enhancing security of software vulnerability. In addition, we will develop a textbook for the training of software vulnerability diagnosis and maintenance education, develop pilot test problems, pilot test of diagnostic staff, The purpose of this study is to enhance the software security of the cyber infrastructures of national and national life by presenting curriculum and diagnosis guide to train the software vulnerability examiner.

An Access Control using SPKI Certificate in Web Environment (웹 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.11-19
    • /
    • 2006
  • Web service is giving an equal privilege to all user for sharing their resources. Under this situation, a lot of vulnerability against the various attacks through the Internet is possible, more sophisticated security services are necessary. In this paper, we propose an access control scheme using SPKI (Simple Public Infrastructure). The scheme designates an access control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

  • PDF

Modelling the dynamic response and failure modes of reinforced concrete structures subjected to blast and impact loading

  • Ngo, Tuan;Mendis, Priyan
    • Structural Engineering and Mechanics
    • /
    • v.32 no.2
    • /
    • pp.269-282
    • /
    • 2009
  • Responding to the threat of terrorist attacks around the world, numerous studies have been conducted to search for new methods of vulnerability assessment and protective technologies for critical infrastructure under extreme bomb blasts or high velocity impacts. In this paper, a two-dimensional behavioral rate dependent lattice model (RDLM) capable of analyzing reinforced concrete members subjected to blast and impact loading is presented. The model inherently takes into account several major influencing factors: the progressive cracking of concrete in tension, the inelastic response in compression, the yielding of reinforcing steel, and strain rate sensitivity of both concrete and steel. A computer code using the explicit algorithm was developed based on the proposed lattice model. The explicit code along with the proposed numerical model was validated using experimental test results from the Woomera blast trial.

Grid Unit Based Analysis of Climate Change Driven Disaster Vulnerability in Urban Area (격자단위 분석기법을 적용한 도시 기후변화 재해취약성분석)

  • Hong, Jeajoo;Lim, HoJong;Ham, YoungHan;Lee, ByoungJae
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.67-75
    • /
    • 2015
  • Today, because human settlements are concentrated into urban area, urban planning and management technique considering the complexity, diversity, and advanced situations of urban living space is being requested. Especially, to effectively respond to large and diverse climate change driven disaster, it is necessary to develop urban planning technique including land use, infrastructure planning based on disaster vulnerability analysis. However, because current urban climate change disaster vulnerability analysis system(UC-VAS) is using census output area as spatial analysis unit, it is difficult to utilize the analysis results for specific urban planning. Instead, this study applies the grid manner to two study areas. The analysis results show that it can generate more detailed results and it can be used for detailed zoning decision by comparing with areal photos. Furthermore, by describing the limitation of the grid manner and providing professional way to secure additional scientific character and objectivity of the future urban climate change disaster vulnerability analysis system, it is expected that this study contributes to the effectiveness of system management.

A Building Method of Security Vulnerability Measurement Framework under u-Healthcare System Traffic Domain Environment Based on USN (USN기반 u-Healthcare 시스템 트래픽도메인 환경에서의 보안위험도 평가체계 설계방안)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.39-46
    • /
    • 2011
  • Smart environment of health information technology, u-Healthcare architecture, ad-hoc networking and wireless communications environment are major factors that increase vulnerability of u-healthcare information systems. Traffic domain is the concept of network route that identifies the u-Healthcare information systems area as the traffic passing and security technologies application. The criterion of division is an area requiring the application of security technology. u-Healthcare information system domains are derived from the intranet section. the public switched network infrastructure, and networking sectors. Domains of health information systems are separated by domain vulnerability reason. In this study, domain-specific security vulnerability assessment system based on the USN in u-Healthcare system is derived. The model used in this study suggests how to establish more effective measurement USN-based health information network security vulnerability which has been vague until now.

A Study on Five Levels of Security Risk Assessment Model Design for Ensuring the u-Healthcare Information System (u-헬스케어시스템의 정보보안 체계 확보를 위한 5단계 보안위험도 평가모델 설계)

  • Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.11-17
    • /
    • 2013
  • All u-Health system has security vulnerabilities. This vulnerability locally(local) or network(network) is on the potential risk. Smart environment of health information technology, Ad-hoc networking, wireless communication environments, u-health are major factor to increase the security vulnerability. u-health care information systems user terminal domain interval, interval public network infrastructure, networking section, the intranet are divided into sections. Health information systems by separating domain specific reason to assess vulnerability vulnerability countermeasure for each domain are different. u-Healthcare System 5 layers of security risk assessment system for domain-specific security vulnerability diagnosis system designed to take the security measures are needed. If you use this proposed model that has been conducted so far vaguely USN-based health information network security vulnerabilities diagnostic measures can be done more systematically provide a model.

Analyses of Light-weight Protocol for Tag Security in RFID System (RFID 시스템에서의 태그 보안을 위한 경량화 프로토콜의 분석)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2399-2403
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper analyses the security risk analysis process from the perspective of the RFID tag life cycle, identify the tag usage process, identify the associated vulnerability and threat to the confidentiality, integrity and availability of the information assets and its implications for privacy, and the mitigate the risks.

Technique for Enhancing Security and Analyses of Vulnerability of RFID Tag security and Protocol (RFID 태그 보안과 프로토콜의 취약점 분석 및 보안성 향상을 위한 기법)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1307-1312
    • /
    • 2011
  • Radio Frequency Identification(RFID) has been considered as an key infrastructure for the ubiquitous society. However, due to the inherent drawbacks, RFID causes var- ious security threats like privacy problems, tag cloning, etc. This paper proposes a novel practical approach, which are fully conformed to EPCglobal RFID Gen2 standard, for enhancing security of currently used RFID Gen2 tags against the various security threats.